小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Algorithmの意味・解説 > Algorithmに関連した共起表現

「Algorithm」の共起表現一覧(1語右で並び替え)

該当件数 : 806



The Verhoeff algorithm, a checksum formula for error detection firs
helped develop the Monte Carlo localization algorithm, a probabilistic approach to mobile robot lo
The DP2s offers a new AF algorithm, a "power save" mode and a modified rear des
In the hierarchical clustering algorithm, a weight Wij is first assigned to each pair
structure to indexing that uses SemanticRank algorithm, a solution mix from the disciplines of onto
ably best-known for his work on the AdaBoost algorithm, a meta-learning algorithm which is used to
Moore invented the Boyer-Moore string search algorithm, a particularly efficient string searching a
Being by nature a greedy algorithm, A* cannot by its nature recover from one ba
Another algorithm achieving the same guarantee uses the Gomory
A hybrid profile reduction algorithm, ACM Trans.
Support for encryption algorithm AES, Twofish, Serpent, including their combi
The nearest neighbour search (NN) algorithm aims to find the point in the tree that is n
ome choices of the α and β parameters of the algorithm allow the multiplication operation to be red
A distributed version of the algorithm also exists.
It is named after the quicksort algorithm, although the C standard does not require it
The column subtraction algorithm: An exact method for solving weighted set co
Thomas Ottmann invented the Bentley-Ottmann algorithm, an efficient algorithm for finding all inte
The software's algorithm analyzes face attributes like skin color, fa
-Sensitive PageRank is based on the PageRank algorithm, and provides a scalable approach for person
hod which has been used to generate texts by algorithm and randomizing techniques that seem meaning
them the initial exposition of the A* search algorithm and the variant of the Hough transform now w
ocess, thus increasing the efficiency of the algorithm and the amount of information that can be ex
nalysed by a software Fast Fourier Transform algorithm and converted into audible sound.
ion tool uses either the Jenson or At Search algorithm and allows for artificial diversions.
work of Wilf and Zeilberger generalized the algorithm and established its correctness.
es for h0 through h3 are the same as the MD5 algorithm, and the fifth (for h4) is similar.
al Tops", "A Fractal Valued Random Iteration Algorithm and Fractal Hierarchy", "V-variable fractals
eing examined (including both the encryption algorithm and key), and comparing the output to the en
er, EICASLAB was equipped with an “automated algorithm and code generation” software engine , that
y, due to its use of the average information algorithm and sparse matrix methods.
Examples include the BCJR algorithm and the soft output Viterbi algorithm.
o-developer of the Boyer-Moore string search algorithm and the Boyer-Moore automated theorem prover
Shillner improved on the algorithm and developed a companion algorithm for remo
present both a constant factor approximation algorithm and polynomial-time approximation scheme to
Some checksum schemes, such as the Luhn algorithm and the Verhoeff algorithm, are specifically
rute-force insight of the machine optimizing algorithm and the intuitive abilities of the human opt
t diffraction pattern include difference map algorithm and "relaxed averaged alternating reflection
rogram depends on two components: the search algorithm and the scoring function.
"return" terminates the algorithm and outputs the value that follows.
fficient graph algorithms such as Dijkstra's algorithm, and in the sorting algorithm heapsort.
and Tarjan (1973) describe essentially this algorithm, and state that at that point it was "well k
eo is based on two simple aspects which are ' Algorithm' and 'User Votes'.
ches the information based on patter mapping algorithm and gives the relative data based on the des
s found using the general number field sieve algorithm and an estimated 8000 MIPS-years of computin
Keys for how to interpret the different algorithm annotations can be found at the top of the "
2004: Martin & Visser algorithm, another generating function method which us
2005: BVW algorithm, apparently the simplest variant now known
Additionally, D3 provides a lossless algorithm applied to RAW file along with uncompressed
The B* algorithm applies to two-player deterministic zero-sum
tice advanced methods like the block Lanczos algorithm are used, that take advantage of certain pro
The parameters of the algorithm are
Several different derivations of this algorithm are possible.
To this day, variations of this algorithm are found in incremental version control sys
models, since algorithms like the Baum-Welch algorithm are not directly applicable, and must be ada
, the most performance-sensitive parts of an algorithm are replaced by hand-written assembly.
lt (though some software does exist: Velvet ( algorithm)), as there cannot be large overlaps between
This figure shows each iteration of the algorithm as red circle points.
to the program which utilizes the INPARANOID algorithm as well as the derived database; this databa
in 1957 E.T. Jaynes re-interpreted the Gibbs algorithm as a much more general, more widely applicab
The algorithm assumes that the image consists of a number
The algorithm attempts to find an optimal series of interc
lomon codes consists of the Welch- Berlekamp algorithm augmented by some additional steps that prep
The algorithm avoids the necessity of performing the squar
ed using MASON include Craig Reynolds' Boids algorithm, Balls and Bands, a simulation of Hooke's La
tax-extensibility, IMP uses a powerful parse algorithm based on a syntax graph and several connecti
as developed by Jason Rohrer using a routing algorithm based on ant colony optimization.
An algorithm based on static single assignment form appea
nux, *BSD, Mac OS X, and Solaris) uses a CRC algorithm based on the ethernet standard frame check a
wsort) is a particularly ineffective sorting algorithm based on the generate and test paradigm.
of the application is a concurrency control algorithm based on the innovative concept of operation
Lingo: a clustering algorithm based on the Singular value decomposition
er and is performed by a specially developed algorithm based on Bayesian statistics.
Daugman's iris recognition algorithm became commercialized when his algorithm was
rs discourage use of these nicknames for the algorithm because the algorithm itself is independent
e, it was said that although "the Metropolis algorithm began as a technique for attacking specific
The algorithm begins by first examining each vertex and ad
The LOCAL algorithm begins by selecting an internal branch of th
The algorithm behind SneakCast is different from its compe
maze generated by modified version of Prim's algorithm, below.
It also introduced for the first time an algorithm better suited to modern digital signal proce
Using this algorithm, both "Robert" and "Rupert" return the same
sions are dynamically selected by a computer algorithm built into the game based on the player's pe
oebe announced a polynomial time recognition algorithm, but it was never published.
till computed using a variation of the Fitch algorithm, but Phylo abstracts the genetic sequences o
It is the conceptually simplest efficient algorithm, but is not as efficient in practice as Tarj
is an informed incremental heuristic search algorithm by Anthony Stentz that combines ideas of A*
epending on whether one proceeds through the algorithm by adding links to or taking links from the
The best basis algorithm by Coifman and Wickerhauser finds a set of b
intermediate results in the kth stage of the algorithm by a scaled polar form
Powers in 1931, and developed as a computer algorithm by Michael A. Morrison and John Brillhart in
example: v is the version, a is the signing algorithm, c is the canonicalization algorithm(s) for
that lack hardware multipliers often use an algorithm called CORDIC (as well as related techniques
The Kirkpatrick-Seidel algorithm, called by its authors "the ultimate planar
There is a new version of the algorithm called MASH-2 with a different exponent.
exist 128, 256 and 320-bit versions of this algorithm, called RIPEMD-128, RIPEMD-256, and RIPEMD-3
With the algorithm called iterative Viterbi decoding one can fi
At the time, the primary advantage of the algorithm came from avoiding computationally expensive
The algorithm can be rearranged into a loop by storing bac
It is known that no algorithm can solve it in less than O(n2) asymptotic t
The algorithm can be described by analogy with a random wa
eled by O(log n)-bit bitstrings such that an algorithm can determine whether two vertices are adjac
ossibly negative distances, the Bellman-Ford algorithm can be used instead.
The Verhoeff algorithm can be implemented using three tables: a mul
It is interesting that the bitap algorithm can be modified to process transposition.
Savitch's theorem guarantees that the algorithm can be simulated in O(log2 n) deterministic
We now show that the algorithm can achieve linear time decoding.
The algorithm can be expressed in terms of continued fract
and an adjacency list representation, Prim's algorithm can be shown to run in time O(E log V) where
oring that number, any integer factorization algorithm can be used to efficiently identify a congru
The performance of this algorithm can be described in terms of the number of i
A related algorithm can be used to minimize the total flow time
The algorithm can also be used to obtain an approximation
Hamming's (7,4) algorithm can correct any single-bit error, or detect
or, alternatively, that another root-finding algorithm can be applied to the estimates to further r
(The Scarf Algorithm cannot be used in this context because the n
Now, supposing that there were some algorithm capable of settling the halting problem, i.e
If x is false, the algorithm checks the value of z and returns it.
ude automated program verification (where an algorithm checks the validity of another algorithm) an
To reduce duplication in the index, Google's algorithm combines listings automatically based on add
registered have participated in at least one Algorithm competition, 0.3% in Design, 0.7% in Develop
raphs with no negative distances, Dijkstra's algorithm computes the shortest path tree, from a give
Dijkstra's algorithm, conceived by Edsger Dijkstra is a graph sea
The algorithm concludes by applying Dijkstra's algorithm t
The algorithm considers a virtual light source producing e
The message digest algorithm consists of 80 rounds.
An FCT algorithm consists of two stages, a transport stage an
Today, topics related to the Metropolis algorithm constitute an entire field of computational
The algorithm continuously increases the size of a tree, o
If the algorithm converges to a fixed point, then that fixed
The algorithm converges in a single round on the suitor-op
This algorithm converges reliably to φ(t), even if it is di
This new algorithm cuts down on false positives at the expense
deas behind his incremental heuristic search algorithm D* Lite, for example, have been incorporated
d to be indistinguishable if there exists no algorithm D, connected to either S or T, able to decid
A distinguishing attack is given by such an algorithm D. It is broadly an attack in which the atta
me of the Pascal-program that implements the algorithm: Define Secondary Structure of Proteins.
and 100 times faster than the original Rete algorithm, depending on the complexity of the rules an
een 82.5% and 163% faster than the Euclidean algorithm, depending on CPU and compiler.
Samplesort is a sorting algorithm described in the 1970 paper "Samplesort: A S
ard is not exactly accurate according to the algorithm described by Henikoff and Henikoff.
eger value α1(k), we compute, using the fast algorithm described above the value (m − 1)!, and make
His research interests lie in the fields of algorithm design and analysis and complexity theory, b
velet transform (SWT) is a wavelet transform algorithm designed to overcome the lack of translation
It is an authenticated encryption algorithm designed to provide both data authenticity (
t was solved by an ingenious computer search algorithm designed by Alex Selby and Oliver Riordan, w
man being: it was generated by a beam search algorithm designed by Andrew Cooke and implemented in
By using a synchronizer, algorithm designers can deal with the simplified "idea
The algorithm determines the next feasible direction towar
so be implemented using a divide-and-conquer algorithm, developed and shown in pseudo-code in.
ression (DMC) is a lossless data compression algorithm developed by Gordon Cormack and Nigel Horspo
The game makes use of a 3D algorithm developed by John Kowalski that was used in
the ANSI Csource code related to the control algorithm developed.
ematics Consortium is committed to numerical algorithm development through open mathematical semant
s not restricted to) database, software, and algorithm development for the study of carbohydrate st
rtus II software, so FPGA designers have the algorithm development, simulation, and verification ca
ode, commonly known as NYSIIS, is a phonetic algorithm devised in 1970 as part of the New York Stat
The search engines algorithm differs from regular search engines because
faster version of the BBP formula, with the algorithm discovered by Bailey, Borwein, and Plouffe i
The GSP algorithm discovers frequent sequences, allowing for t
the result is easy to prove directly: if an algorithm does not perform n(n − 1)/2 tests, it cannot
flashsort with its low memory benefits, the algorithm does not use addition data structures to sto
The Shiloach-Vishkin algorithm, due to Yossi Shiloach and Uzi Vishkin, is t
state-of-the-art Viola-Jones face detection algorithm employs AdaBoost with decision stumps as wea
Several rules in the algorithm encode multiple character n-grams as single
tion algorithms, algorithmic game theory and algorithm engineering.
programmer who needs to implement a specific algorithm, especially an unfamiliar one, will often st
The non-existence of such an algorithm, established by Yuri Matiyasevich in 1970, a
e cutting-plane method, resolution, the DPLL algorithm, etc. produce different proofs when applied
iqueness of the solutions, stagnation of the algorithm etc.
The algorithm examines the structure present in a pairwise
Periodically a particular detection algorithm examines a structure for errors.
cedure for doing this is possible just as no algorithm exists for detecting ambiguous grammars.
kewed datasets, an optimization of the query algorithm exists, which improves the query efficiency
Karmarkar's algorithm falls within the class of interior point met
The algorithm finds a maximal set of vertex disjoint augme
An example showing how the FKT algorithm finds a Pfaffian orientation.
Once the algorithm finds a one-sided identity all future terms
When the algorithm finishes this process for the root node, the
optimization, 2-opt is a simple local search algorithm first proposed by Croes in 1958 for solving
In statistical mechanics, the Gibbs algorithm, first introduced by J. Willard Gibbs in 187
The algorithm firstly indexes each sub-sequence of length
An Algorithm for Reducing the Bandwidth and Profile of a
it is not possible to skip any questions: an algorithm for determining whether the graph has the pr
Using the Coppersmith-Winograd algorithm for multiplying these matrices, this gives a
the bakery algorithm for mutual exclusion of multiple threads in
In 1989 she introduced the first algorithm for deciding which nested radicals can be de
Dissociated press is an algorithm for generating text based on another text.
A divide and conquer algorithm for triangulations in two dimensions is due
The figure on the right illustrates a simple algorithm for constructing a weak 2-coloring in an arb
n of Cassowary, a popular linear programming algorithm for handling Manhattan goal functions.
and is known for the Shamos-Hoey sweep line algorithm for line segment intersection detection and
est known for the development of the SEQUEST algorithm for automated peptide sequencing and Multidi
mula for ψ is known, but Gosper describes an algorithm for fast numerical approximation of its valu
Unlike the UPGMA algorithm for tree reconstruction, neighbor joining do
                                                                                                   


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2026 GRAS Group, Inc.RSS